Remove Data Remove Risk Management Remove White Paper
article thumbnail

Mobile Security – A Requirement for National Security (E166)

FedInsider

This week on Feds At the Edge, leaders from the Federal and commercial sectors share vulnerabilities in the devices we bring from home, and the popular apps that put our sensitive data into the wrong hands. We explore websites that are designed to fool the end users into believing they are on a secure platform.

article thumbnail

Letting the Good Ones In, Keeping the Bad Ones Out: Managing Access for Zero Trust

FedInsider

The strongest form of identity management is attribute-based, moving beyond one’s role or position to a host of other characteristics, from behavioral to physical to time-sensitive. It takes multi-factor authentication (MFA) to a whole new level, but it requires reliable attributes and quality data to implement. Army War College.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Facing the Challenges Artificial Intelligence Poses

FedInsider

What agencies are looking for is help addressing their boots-on-the-ground challenges, such as the lack of specialized talent, where they should invest their limited R&D funds, meeting the lofty standards of the AI bill of rights – or even how their own data assets are gathered, organized, and used in AI applications.

article thumbnail

Pentagon IG not impressed by effectiveness of DoD vendors’ award fees

Federal News Network

Auditors said without solid data, it’s hard to determine whether those award fees do much good. ( White papers are due by March 7, and winners will be announced on August 23. This month, CISA extended the charter through 2026 for the Information and Communications Technology Supply Chain Risk Management Task Force.

article thumbnail

Emerging Technology Series: Cybersecurity

FedInsider

For FedInsider, he has written many articles and white papers and acted as the moderator for over 20 interviews featuring federal, state and local officials discussing technology, policy and governmental issues. Team Cymru specializes in using data-driven intelligence to assist in understanding the real impact of cyber-crime.

article thumbnail

Using the Tools at Hand to Get to Zero Trust

FedInsider

Additionally, Mark helps clients understand where to start with zero trust and how to utilize security program management and security risk management to ensure continued success in the implementation of Zero Trust concepts.

article thumbnail

Procurement policy spring cleaning checklist

Federal News Network

And what of the data that is the “fuel” powering AI? How is that data validated and being used to avoid bias? Supply chain risk management and domestic sourcing. How is AI being leveraged to streamline procurement processes and evaluations? How is industry using AI to compete and win government business?